Posted by HSSL Technologies on Sep 4th 2021
When the world came to a standstill in 2020, cloud transformation efforts got dramatically accelerated at many businesses. The pandemic turbocharged the shift to a remote workforce – and fundamentally changed how employees interact with data.
Securing Remote and
Hybrid Workforces
But this caused ripples (or tidal waves) throughout organizations’ IT systems.
Sensitive data is now flowing out of data centers and into the homes of
employees and other remote locations at a greater volume than ever before.
While this created a more agile and productive workforce, it also increased the
risks that organizations face.
Walking
the Tightrope Between Protecting Data and Enabling Remote Working
Balancing data
protection and the enablement of remote working is like walking a tightrope,
and organizations are incorporating new security models and solutions to meet
this demand.
Identifying Data Security Risks Within the Remote Workforce
Collaboration looks different these days. Teamwork has moved from the office to
the web, and the business tools facilitating this adjustment are changing how
data moves throughout the organization.
Digital whiteboards have taken place of physical ones, and printers are in the
living room instead of next to a secure shredder. The resulting lack of control
over where sensitive information ends up has organizations rethinking their
security policies to avoid a potential leak or breach. Some have even gone as
far as disabling at-home printing or removing access to certain applications.
It doesn’t take a security expert to understand that locking data away to avoid
any mistakes is counterintuitive. Productivity is why people work remotely in
the first place, but traditional security measures can be at odds with the
agility that cloud-first operations offer. Fortunately, new approaches are
enabling security to deliver on why it exists in the first place: to let people
safely get—and use—the data they need.
The most effective way to do this is to step back and evaluate the ways your
workforce interacts with data, including:
- Understand your data: Whether it’s private data (medical, financial, etc.) or intellectual property, locate that information and map where it goes and where it is used. Identify high-risk users at the outset and determine safe ways to access applications, like Zero Trust Network Access.
- Consider layers of control: Evaluate groups of trusted users and their relationships with data they work with. Zero Trust is all about letting people access only those resources they explicitly need to get their job done; it’s more than a best practice, it’s common sense.
- Make people aware of data: Educate users about the risks posed to the organization with certain types of data. They may not realize the tool they’re using – like a digital whiteboard or portal – is high risk.
Gartner found 75
percent of midsize enterprises plan to use a hybrid workforce
model, so users will continue to interact with data outside of
traditional IT defenses. Gaining a strong grasp of what the new risks to data
security are and where they sit will help businesses put in place the right
security controls for the new ways their network and applications are being
sued.
Watch the Webinar for Remote Working Security Best Practices
Protecting the workforce without hindering functionality is an area every
business can improve in. With the right strategy, security teams can power the
productivity of remote employees. I recently discussed this topic in a lively
webinar with Paul Haywood, Group CISO at BUPA. We were joined
by moderator Alex Hilton, CEO of Cloud Industry Forum.
Watch the on-demand version to dive more into the changes companies have seen protecting remote employees, best practices in how organizations can adjust their security strategies to meet emerging threats head on and more.